Professional Documents
Culture Documents
INTQUE
INTQUE
https://medium.com/@teqstories/aws-solutions-architect-job-interview-general-questions-f19fa1f
666d
https://github.com/bregman-arie/devops-exercises/blob/master/certificates/cloud-practitioner.md
https://mindmajix.com/aws-interview-questions#frequently
Q: Is it possible to SSH into the EC2 instance without the .pem file?
No, the .pem file is only available at the time of the instance creation. It must be downloaded
and saved at that time only. In case the .pem file is lost or wasn’t saved, the user can never ssh
into the instance.
Q: What should be done if the .pem file is missing?
A new instance needs to be created and sync all the databases and instances of the previous
instances to the new instance, and once the new instance is up running, the old instance can be
terminated.
Q: What are the different types of Cloud Services and their differences.
There are four types of Cloud Services:
● SaaS(Software as a Service)- SaaS is a fully-developed software solution ready for
purchase and uses over the internet on a subscription basis. The SaaS provider
manages the infrastructure, operating systems, middleware, and data necessary to
deliver the program, ensuring that the software is available whenever and wherever
customers need it. Examples of SaaS: Microsoft Office 365, Salesforce, Cisco WebEx,
Google Apps.
● PaaS(Platform as a Service)- PaaS provides the framework needed to build, test,
deploy, manage, and update software products. It also includes the operating systems,
middleware, development tools, and database management systems needed to create
software applications—examples of PaaS: AWS Elastic Beanstalk, Apache Stratos,
Google App Engine, Microsoft Azure.
● Iaas(Infrastructure as a Service)- IaaS is the most comprehensive and flexible cloud
service type. It provides a completely virtualised computing infrastructure that is
provisioned and managed over the internet. An IaaS provider manages the physical end
of the infrastructure (servers, data storage space, etc.) in data centres but allows
customers to customise those virtualised resources to suit their specific needs fully.
Examples of IaaS: Microsoft Azure, Amazon Web Services (AWS), Cisco Metacloud,
Google Compute Engine (GCE).
● Faas(Function as a Service)- Also known as serverless computing, FaaS allows
customers to execute code responsively without allocating processing resources ahead
of time. The cloud provider handles the infrastructure, allowing the customer to focus
strictly on deploying application code. Functions scale automatically, making them an
excellent fit for dynamic workloads that fluctuate in resource consumption. Customers
only pay for the resources they use, making FaaS the truest form of “pay-as-you-go”
cloud computing. Examples of FaaS: AWS Lambdas, Azure Functions.
Q: What are different levels of security present in AWS to prevent your resources?
There are two security layers present for our resources in AWS VPC. One is network-level
security, also known as NACL(Network access control list), and another one is instance-level
security, know as security group(SG).
Q: What happens to the data stored for a very long time in the S3 bucket?
After adding data to the S3 bucket and kept unused for a long time(30 days in general), the data
gets archived and will ve moved to the S3 Glacier. Glacier is comparatively very cheap but takes
time to restore the data to the local machines.
Q: What is an SQS dead-letter queue (DLQ), and what could you use it for?
SQS is Amazon’s fully managed distributed queue service. Queues are useful for handling
communication between different services or other components in distributed systems.
A DLQ is a special queue for messages that could not be adequately processed. These queues
are specially used for debugging and troubleshooting applications.
Q: Suppose you have hired a team of DevOps freelancers to set up your infrastructure.
You create an IAM group called “DevOps” and add the team to that group. After the team
finishes setting your infrastructure up, they leave your project. What actions should you
take?
You should delete only the user accounts from the developers and keep the IAM group. It is
possible that, in the future, you will want to hire more DevOps freelancers to change your
infrastructure. Keeping the IAM group will mean you kept the underlying set of policies, and
therefore, future users can reuse those policies.
a NoSQL service. Redshift is a data warehouse product used for data analysis.
Ans: Route Table is used to route the network pockets. Generally, one route table would be
available in each subnet. Route table can have any no. of records or information. Hence